Tuesday, February 18, 2020

WEEK 8 DISCUSSION PART 1 Essay Example | Topics and Well Written Essays - 500 words

WEEK 8 DISCUSSION PART 1 - Essay Example In addition, the researchers used generalized themes to organize the data in a coherent manner (Branthwaite, & Patterson, 2011). Unlike Jacobson, Krause use a closed hypothesis by assuming that people engage in Medicare fraud for economic purpose only. On the other hand, Jacobson approaches the study through an all-inclusive hypothesis that assumes variation in the reasons for engagement in Medicare fraud. Both articles have similar approach in data representation. The two researchers rely on statistics to represent as the main segment of their data. Statistical facts and other numerical constants are the main numerical facts presented by the researchers. However, the two articles have a slight variation in their interpretation of data. Krause relies on limits to prove most of her arguments. For instance, she claims that the US government spent over $2.5 trillion on health care in 2009. The numerical values are not accurate but they represent the margin of the lowest or minimal value. To enhance accuracy or reduce workload, researchers are tempted to exclude some variables or restructure their variable space. Similarly, the two articles indicate a great deal of variable space shrinkage. For instance, Krause ignores the efforts of judicial system in cubing Medicare fraud. On the other hand, Jacobson consider time as the most significant variable in his analysis. Research constraints and the inability to apply all variables encountered in a given study is the main source of weaknesses or limitations in a research. For the purpose of future studies, researchers are encouraged to highlight some of the limitation in their studies. Both articles have significant limitation or disagreements between theoretical and actual inferences. However, both researchers have different approaches in reporting limitations encountered in their studies. Unlike Krause, Jacobson’s article has discrete statements that describe the limitations

Monday, February 3, 2020

Computer Misuse - law Essay Example | Topics and Well Written Essays - 2500 words

Computer Misuse - law - Essay Example The cost of the crime in many cases is immense. The confidence of the general public has succumbed and internet is regarded as a place with ’wild west’ culture. The internet service providers, Government, hardware and software manufacturers have done little to minimize the various risks associated with use of internet. Ekaterina Drozdova a doctoral candidate of Stern School of Business, New York University conducted a survey about legal codes regarding e-crimes in fifty countries and came up different actions that can account for breaching of cyber laws. They are; unauthorized access, unlawful fiddling with files or data (e.g. illegal copying, alteration, or destruction), damage to computer or network (e.g. viruses, worms, Trojan horses), use of information systems to commit or advance conventional crimes (e.g. scam, forgery, money laundering, acts of terrorism), computer-mediated spying, infringement of privacy in the attainment of personal data theft or damage of computer hardware or software (Sofaer & Goodman, 2001). According to one report about the rising public anxiety in relation to e-crimes, 21% of the people felt at risk from e-crimes and only 16% worried about burglary in UK. It is also estimated that an average company or firm in UK loses about 3% of its profits to electronic theft. According to one estimate in the UK, Â £40 billion is spent on the fraud prevention industry which is equivalent to half of what the country spends on the National Health Service (Saxby, 2006). This alarming report is reason enough to undertake every measure to aid in provision of the security that the internet users deserve. The figures like this makes it clear that computer misuse is a very wide spread and board level issue that needs a more sound infrastructure to amply fight it, instead of relying on just the IT department of organizations to counteract it. The